[PATCH 5.6 04/41] net: check untrusted gso_size at kernel entry

2020-06-09 Thread Greg Kroah-Hartman
From: Willem de Bruijn [ Upstream commit 6dd912f82680761d8fb6b1bb274a69d4c7010988 ] Syzkaller again found a path to a kernel crash through bad gso input: a packet with gso size exceeding len. These packets are dropped in tcp_gso_segment and udp[46]_ufo_fragment. But they may affect gso size cal

[PATCH 5.6 02/41] l2tp: add sk_family checks to l2tp_validate_socket

2020-06-09 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit d9a81a225277686eb629938986d97629ea102633 ] syzbot was able to trigger a crash after using an ISDN socket and fool l2tp. Fix this by making sure the UDP socket is of the proper family. BUG: KASAN: slab-out-of-bounds in setup_udp_tunnel_sock+0x465/0x540 net/

[PATCH 5.7 09/24] iio: adc: stm32-adc: fix a wrong error message when probing interrupts

2020-06-09 Thread Greg Kroah-Hartman
From: Fabrice Gasnier commit 10134ec3f8cefa6a40fe84987f1795e9e0da9715 upstream. A wrong error message is printed out currently, like on STM32MP15: - stm32-adc-core 48003000.adc: IRQ index 2 not found. This is seen since commit 7723f4c5ecdb ("driver core: platform: Add an error message to platfo

Re: [RFC PATCH 1/2] dt-bindings: tas2562: Add firmware support for tas2563

2020-06-09 Thread Mark Brown
On Tue, Jun 09, 2020 at 12:35:50PM -0500, Dan Murphy wrote: > On 6/9/20 12:31 PM, Mark Brown wrote: > > Why not just use a standard name for the firmware? If the firmwares > > vary per-board then building it using the machine compatible (or DMI > > info) could handle that, with a fallback to a st

[PATCH 5.6 03/41] l2tp: do not use inet_hash()/inet_unhash()

2020-06-09 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 02c71b144c811bcdd865e0a1226d0407d11357e8 ] syzbot recently found a way to crash the kernel [1] Issue here is that inet_hash() & inet_unhash() are currently only meant to be used by TCP & DCCP, since only these protocols provide the needed hashinfo pointer.

[PATCH 5.7 05/24] USB: serial: ch341: fix lockup of devices with limited prescaler

2020-06-09 Thread Greg Kroah-Hartman
From: Johan Hovold commit c432df155919582a3cefa35a8f86256c830fa9a4 upstream. Michael Hanselmann reports that [a] subset of all CH341 devices stop responding to bulk transfers, usually after the third byte, when the highest prescaler bit (0b100) is set. There is one excep

[PATCH 5.7 13/24] serial: 8250: Enable 16550A variants by default on non-x86

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Triplett commit 15a3f03d5ec0118f1e5db3fc1018686e72744e37 upstream. Some embedded devices still use these serial ports; make sure they're still enabled by default on architectures more likely to have them, to avoid rendering someone's console unavailable. Reported-by: Vladimir Oltean

[PATCH 5.7 14/24] vt: keyboard: avoid signed integer overflow in k_ascii

2020-06-09 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit b86dab054059b970111b5516ae548efaae5b3aae upstream. When k_ascii is invoked several times in a row there is a potential for signed integer overflow: UBSAN: Undefined behaviour in drivers/tty/vt/keyboard.c:888:19 signed integer overflow: 10 * 11 cannot be rep

[PATCH 5.7 23/24] x86/speculation: Add Ivy Bridge to affected list

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 3798cc4d106e91382bfe016caa2edada27c2bb3f upstream Make the docs match the code. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst | 7

[PATCH 5.7 21/24] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7e5b3c267d256822407a22fdce6afdf9cd13f9fb upstream SRBDS is an MDS-like speculative side channel that can leak bits from the random number generator (RNG) across cores and threads. New microcode serializes the processor access during the execution of RDRAND and RDSEED. Thi

[PATCH 5.7 15/24] tty: hvc_console, fix crashes on parallel open/close

2020-06-09 Thread Greg Kroah-Hartman
From: Jiri Slaby commit 24eb2377f977fe06d84fca558f891f95bc28a449 upstream. hvc_open sets tty->driver_data to NULL when open fails at some point. Typically, the failure happens in hp->ops->notifier_add(). If there is a racing process which tries to open such mangled tty, which was not closed yet,

[PATCH 5.6 35/41] x86/cpu: Add a steppings field to struct x86_cpu_id

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit e9d7144597b10ff13ff2264c059f7d4a7fbc89ac upstream Intel uses the same family/model for several CPUs. Sometimes the stepping must be checked to tell them apart. On x86 there can be at most 16 steppings. Add a steppings bitmask to x86_cpu_id and a X86_MATCH_VENDOR_FAMILY_M

[PATCH 5.7 03/24] USB: serial: option: add Telit LE910C1-EUX compositions

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas commit 399ad9477c523f721f8e51d4f824bdf7267f120c upstream. Add Telit LE910C1-EUX compositions: 0x1031: tty, tty, tty, rmnet 0x1033: tty, tty, tty, ecm Signed-off-by: Daniele Palmas Link: https://lore.kernel.org/r/20200525211106.27338-1-dnl...@gmail.com Cc:

[PATCH 5.7 12/24] usb: musb: jz4740: Prevent lockup when CONFIG_SMP is set

2020-06-09 Thread Greg Kroah-Hartman
From: Paul Cercueil commit 685f5f24108a5f3481da70ee75a1b18b9de34257 upstream. The function dma_controller_irq() locks up the exact same spinlock we locked before calling it, which obviously resulted in a deadlock when CONFIG_SMP was enabled. This flew under the radar as none of the boards suppor

[PATCH 5.6 24/41] iio: vcnl4000: Fix i2c swapped word reading.

2020-06-09 Thread Greg Kroah-Hartman
From: Mathieu Othacehe commit 18dfb5326370991c81a6d1ed6d1aeee055cb8c05 upstream. The bytes returned by the i2c reading need to be swapped unconditionally. Otherwise, on be16 platforms, an incorrect value will be returned. Taking the slow path via next merge window as its been around a while and

[PATCH 5.7 17/24] CDC-ACM: heed quirk also in error handling

2020-06-09 Thread Greg Kroah-Hartman
From: Oliver Neukum commit 97fe809934dd2b0b37dfef3a2fc70417f485d7af upstream. If buffers are iterated over in the error case, the lower limits for quirky devices must be heeded. Signed-off-by: Oliver Neukum Reported-by: Jean Rene Dawin Fixes: a4e7279cd1d19 ("cdc-acm: introduce a cool down") C

[PATCH 5.7 16/24] staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK

2020-06-09 Thread Greg Kroah-Hartman
From: Pascal Terjan commit 15ea976a1f12b5fd76b1bd6ff3eb5132fd28047f upstream. The value in shared headers was fixed 9 years ago in commit 8d661f1e462d ("ieee80211: correct IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK macro") and while looking at using shared headers for other duplicated constants I notic

[PATCH 5.6 15/41] mptcp: fix unblocking connect()

2020-06-09 Thread Greg Kroah-Hartman
From: Paolo Abeni [ Upstream commit 41be81a8d3d09acb9033799938306349328861f9 ] Currently unblocking connect() on MPTCP sockets fails frequently. If mptcp_stream_connect() is invoked to complete a previously attempted unblocking connection, it will still try to create the first subflow via __mptc

Re: [PATCH] KVM: nVMX: Wrap VM-Fail valid path in generic VM-Fail helper

2020-06-09 Thread Jim Mattson
On Mon, Jun 8, 2020 at 6:56 PM Sean Christopherson wrote: > > Add nested_vmx_fail() to wrap VM-Fail paths that _may_ result in VM-Fail > Valid to make it clear at the call sites that the Valid flavor isn't > guaranteed. > > Suggested-by: Vitaly Kuznetsov > Signed-off-by: Sean Christopherson Revi

[PATCH 5.6 07/41] net: usb: qmi_wwan: add Telit LE910C1-EUX composition

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas [ Upstream commit 591612aa578cd7148b7b9d74869ef40118978389 ] Add support for Telit LE910C1-EUX composition 0x1031: tty, tty, tty, rmnet Signed-off-by: Daniele Palmas Acked-by: Bjørn Mork Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/u

[PATCH 5.6 14/41] net: dsa: felix: send VLANs on CPU port as egress-tagged

2020-06-09 Thread Greg Kroah-Hartman
From: Vladimir Oltean [ Upstream commit 183be6f967fe37c3154bfac39e913c3bafe89d1b ] As explained in other commits before (b9cd75e66895 and 87b0f983f66f), ocelot switches have a single egress-untagged VLAN per port, and the driver would deny adding a second one while an egress-untagged VLAN alread

Re: [PATCH v3 1/7] Documentation: dynamic-debug: Add description of level bitmask

2020-06-09 Thread Joe Perches
On Tue, 2020-06-09 at 18:42 +0100, Edward Cree wrote: > On 09/06/2020 17:58, Joe Perches wrote: > > On Tue, 2020-06-09 at 13:16 +0200, Greg Kroah-Hartman wrote: > > > What is wrong with the existing control of dynamic > > > debug messages that you want to add another type of arbitrary grouping > >

[PATCH 5.7 19/24] x86/cpu: Add a steppings field to struct x86_cpu_id

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit e9d7144597b10ff13ff2264c059f7d4a7fbc89ac upstream Intel uses the same family/model for several CPUs. Sometimes the stepping must be checked to tell them apart. On x86 there can be at most 16 steppings. Add a steppings bitmask to x86_cpu_id and a X86_MATCH_VENDOR_FAMILY_M

[PATCH 5.7 20/24] x86/cpu: Add table argument to cpu_matches()

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 93920f61c2ad7edb01e63323832585796af75fc9 upstream To make cpu_matches() reusable for other matching tables, have it take a pointer to a x86_cpu_id table as an argument. [ bp: Flip arguments order. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Signed-off-

[PATCH 5.7 18/24] nvmem: qfprom: remove incorrect write support

2020-06-09 Thread Greg Kroah-Hartman
From: Srinivas Kandagatla commit 8d9eb0d6d59a5d7028c80a30831143d3e75515a7 upstream. qfprom has different address spaces for read and write. Reads are always done from corrected address space, where as writes are done on raw address space. Writing to corrected address space is invalid and ignored

[PATCH 5.7 08/24] iio:chemical:pms7003: Fix timestamp alignment and prevent data leak.

2020-06-09 Thread Greg Kroah-Hartman
From: Jonathan Cameron commit 13e945631c2ffb946c0af342812a3cd39227de6e upstream. One of a class of bugs pointed out by Lars in a recent review. iio_push_to_buffers_with_timestamp assumes the buffer used is aligned to the size of the timestamp (8 bytes). This is not guaranteed in this driver whi

[PATCH 5.7 04/24] USB: serial: ch341: add basis for quirk detection

2020-06-09 Thread Greg Kroah-Hartman
From: Michael Hanselmann commit c404bf4aa9236cb4d1068e499ae42acf48a6ff97 upstream. A subset of CH341 devices does not support all features, namely the prescaler is limited to a reduced precision and there is no support for sending a RS232 break condition. This patch adds a detection function whi

[PATCH 5.7 01/24] USB: serial: qcserial: add DW5816e QDL support

2020-06-09 Thread Greg Kroah-Hartman
From: Matt Jolly commit 3429444abdd9dbd5faebd9bee552ec6162b17ad6 upstream. Add support for Dell Wireless 5816e Download Mode (AKA boot & hold mode / QDL download mode) to drivers/usb/serial/qcserial.c This is required to update device firmware. Signed-off-by: Matt Jolly Cc: sta...@vger.kernel

[PATCH 5.7 00/24] 5.7.2-rc1 review

2020-06-09 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.7.2 release. There are 24 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 11 Jun 2020 17:41:38 +. Anything recei

[PATCH 5.7 24/24] uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned

2020-06-09 Thread Greg Kroah-Hartman
From: Oleg Nesterov commit 013b2deba9a6b80ca02f4fafd7dedf875e9b4450 upstream. uprobe_write_opcode() must not cross page boundary; prepare_uprobe() relies on arch_uprobe_analyze_insn() which should validate "vaddr" but some architectures (csky, s390, and sparc) don't do this. We can remove the B

[PATCH 5.7 22/24] x86/speculation: Add SRBDS vulnerability and mitigation documentation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7222a1b5b87417f22265c92deea76a6aecd0fb0f upstream Add documentation for the SRBDS vulnerability and its mitigation. [ bp: Massage. jpoimboe: sysfs table strings. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Reviewed-by: Tony Luck Reviewed-by: Josh P

[PATCH 5.6 38/41] x86/speculation: Add SRBDS vulnerability and mitigation documentation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7222a1b5b87417f22265c92deea76a6aecd0fb0f upstream Add documentation for the SRBDS vulnerability and its mitigation. [ bp: Massage. jpoimboe: sysfs table strings. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Reviewed-by: Tony Luck Reviewed-by: Josh P

[PATCH 5.6 32/41] staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK

2020-06-09 Thread Greg Kroah-Hartman
From: Pascal Terjan commit 15ea976a1f12b5fd76b1bd6ff3eb5132fd28047f upstream. The value in shared headers was fixed 9 years ago in commit 8d661f1e462d ("ieee80211: correct IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK macro") and while looking at using shared headers for other duplicated constants I notic

[PATCH 5.6 13/41] net: be more gentle about silly gso requests coming from user

2020-06-09 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 7c6d2ecbda83150b2036a2b36b21381ad4667762 ] Recent change in virtio_net_hdr_to_skb() broke some packetdrill tests. When --mss=XXX option is set, packetdrill always provide gso_type & gso_size for its inbound packets, regardless of packet size. if (pa

[PATCH 5.6 37/41] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7e5b3c267d256822407a22fdce6afdf9cd13f9fb upstream SRBDS is an MDS-like speculative side channel that can leak bits from the random number generator (RNG) across cores and threads. New microcode serializes the processor access during the execution of RDRAND and RDSEED. Thi

[PATCH 5.6 36/41] x86/cpu: Add table argument to cpu_matches()

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 93920f61c2ad7edb01e63323832585796af75fc9 upstream To make cpu_matches() reusable for other matching tables, have it take a pointer to a x86_cpu_id table as an argument. [ bp: Flip arguments order. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Signed-off-

[PATCH 5.6 06/41] net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a

2020-06-09 Thread Greg Kroah-Hartman
From: Fugang Duan [ Upstream commit f2fb6b6275eba9d312957ca44c487bd780da6169 ] For rx filter 'HWTSTAMP_FILTER_PTP_V2_EVENT', it should be PTP v2/802.AS1, any layer, any kind of event packet, but HW only take timestamp snapshot for below PTP message: sync, Pdelay_req, Pdelay_resp. Then it causes

[PATCH 5.6 20/41] USB: serial: option: add Telit LE910C1-EUX compositions

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas commit 399ad9477c523f721f8e51d4f824bdf7267f120c upstream. Add Telit LE910C1-EUX compositions: 0x1031: tty, tty, tty, rmnet 0x1033: tty, tty, tty, ecm Signed-off-by: Daniele Palmas Link: https://lore.kernel.org/r/20200525211106.27338-1-dnl...@gmail.com Cc:

[PATCH 5.6 05/41] net/mlx5: Fix crash upon suspend/resume

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Bloch [ Upstream commit 8fc3e29be9248048f449793502c15af329f35c6e ] Currently a Linux system with the mlx5 NIC always crashes upon hibernation - suspend/resume. Add basic callbacks so the NIC could be suspended and resumed. Fixes: 9603b61de1ee ("mlx5: Move pci device handling from ml

Re: [PATCH v6 6/6] blktrace: fix debugfs use after free

2020-06-09 Thread Luis Chamberlain
On Tue, Jun 09, 2020 at 10:32:18AM -0700, Christoph Hellwig wrote: > On Tue, Jun 09, 2020 at 05:29:22PM +, Luis Chamberlain wrote: > > Is scsi-generic is the only unwanted ugly child blktrace has to deal > > with? For some reason I thought drivers/md/md.c was one but it seems > > like it is not

[PATCH 5.6 17/41] net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta()

2020-06-09 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso [ Upstream commit a683012a8e77675a1947cc8f11f97cdc1d5bb769 ] The drivers reports EINVAL to userspace through netlink on invalid meta match. This is confusing since EINVAL is usually reserved for malformed netlink messages. Replace it by more meaningful codes. Fixes: 6d65

[PATCH 5.6 29/41] serial: 8250: Enable 16550A variants by default on non-x86

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Triplett commit 15a3f03d5ec0118f1e5db3fc1018686e72744e37 upstream. Some embedded devices still use these serial ports; make sure they're still enabled by default on architectures more likely to have them, to avoid rendering someone's console unavailable. Reported-by: Vladimir Oltean

[PATCH 5.6 22/41] USB: serial: ch341: fix lockup of devices with limited prescaler

2020-06-09 Thread Greg Kroah-Hartman
From: Johan Hovold commit c432df155919582a3cefa35a8f86256c830fa9a4 upstream. Michael Hanselmann reports that [a] subset of all CH341 devices stop responding to bulk transfers, usually after the third byte, when the highest prescaler bit (0b100) is set. There is one excep

[PATCH 5.4 21/34] usb: musb: Fix runtime PM imbalance on error

2020-06-09 Thread Greg Kroah-Hartman
From: Dinghao Liu commit e4befc121df03dc8ed2ac1031c98f9538e244bae upstream. When copy_from_user() returns an error code, there is a runtime PM usage counter imbalance. Fix this by moving copy_from_user() to the beginning of this function. Fixes: 7b6c1b4c0e1e ("usb: musb: fix runtime PM in debu

[PATCH 5.4 15/34] USB: serial: ch341: add basis for quirk detection

2020-06-09 Thread Greg Kroah-Hartman
From: Michael Hanselmann commit c404bf4aa9236cb4d1068e499ae42acf48a6ff97 upstream. A subset of CH341 devices does not support all features, namely the prescaler is limited to a reduced precision and there is no support for sending a RS232 break condition. This patch adds a detection function whi

[PATCH 5.4 19/34] iio: adc: stm32-adc: fix a wrong error message when probing interrupts

2020-06-09 Thread Greg Kroah-Hartman
From: Fabrice Gasnier commit 10134ec3f8cefa6a40fe84987f1795e9e0da9715 upstream. A wrong error message is printed out currently, like on STM32MP15: - stm32-adc-core 48003000.adc: IRQ index 2 not found. This is seen since commit 7723f4c5ecdb ("driver core: platform: Add an error message to platfo

[PATCH 5.4 34/34] Revert "net/mlx5: Annotate mutex destroy for root ns"

2020-06-09 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit 3f4f034a8676e366857861e76c3ad11ae059b2fb which is commit 9ca415399dae133b00273a4283ef31d003a6818d upstream. It was backported incorrectly, Paul writes at: https://lore.kernel.org/r/20200607203425.gd23...@windriver.com I happened to no

[PATCH 5.4 29/34] x86/cpu: Add table argument to cpu_matches()

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 93920f61c2ad7edb01e63323832585796af75fc9 upstream To make cpu_matches() reusable for other matching tables, have it take a pointer to a x86_cpu_id table as an argument. [ bp: Flip arguments order. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Signed-off-

[PATCH 5.4 24/34] staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK

2020-06-09 Thread Greg Kroah-Hartman
From: Pascal Terjan commit 15ea976a1f12b5fd76b1bd6ff3eb5132fd28047f upstream. The value in shared headers was fixed 9 years ago in commit 8d661f1e462d ("ieee80211: correct IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK macro") and while looking at using shared headers for other duplicated constants I notic

[PATCH 5.4 30/34] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7e5b3c267d256822407a22fdce6afdf9cd13f9fb upstream SRBDS is an MDS-like speculative side channel that can leak bits from the random number generator (RNG) across cores and threads. New microcode serializes the processor access during the execution of RDRAND and RDSEED. Thi

[PATCH 5.4 17/34] iio: vcnl4000: Fix i2c swapped word reading.

2020-06-09 Thread Greg Kroah-Hartman
From: Mathieu Othacehe commit 18dfb5326370991c81a6d1ed6d1aeee055cb8c05 upstream. The bytes returned by the i2c reading need to be swapped unconditionally. Otherwise, on be16 platforms, an incorrect value will be returned. Taking the slow path via next merge window as its been around a while and

[PATCH 5.4 33/34] uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned

2020-06-09 Thread Greg Kroah-Hartman
From: Oleg Nesterov commit 013b2deba9a6b80ca02f4fafd7dedf875e9b4450 upstream. uprobe_write_opcode() must not cross page boundary; prepare_uprobe() relies on arch_uprobe_analyze_insn() which should validate "vaddr" but some architectures (csky, s390, and sparc) don't do this. We can remove the B

[PATCH 5.4 22/34] vt: keyboard: avoid signed integer overflow in k_ascii

2020-06-09 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit b86dab054059b970111b5516ae548efaae5b3aae upstream. When k_ascii is invoked several times in a row there is a potential for signed integer overflow: UBSAN: Undefined behaviour in drivers/tty/vt/keyboard.c:888:19 signed integer overflow: 10 * 11 cannot be rep

Re: [PATCH 1/1] tools: testing: ftrace: trigger: fix spelling mistake

2020-06-09 Thread Steven Rostedt
On Tue, 9 Jun 2020 18:38:53 +0200 Flavio Suligoi wrote: > Fix typo: "tigger" --> "trigger" Acked-by: Steven Rostedt (VMware) Shuah, want to take this patch? -- Steve > > Signed-off-by: Flavio Suligoi > --- > tools/testing/selftests/ftrace/test.d/trigger/trigger-hist.tc | 2 +- > .../sel

[PATCH 5.4 12/34] USB: serial: qcserial: add DW5816e QDL support

2020-06-09 Thread Greg Kroah-Hartman
From: Matt Jolly commit 3429444abdd9dbd5faebd9bee552ec6162b17ad6 upstream. Add support for Dell Wireless 5816e Download Mode (AKA boot & hold mode / QDL download mode) to drivers/usb/serial/qcserial.c This is required to update device firmware. Signed-off-by: Matt Jolly Cc: sta...@vger.kernel

[PATCH 5.4 00/34] 5.4.46-rc1 review

2020-06-09 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.4.46 release. There are 34 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 11 Jun 2020 17:40:27 +. Anything rece

[PATCH 5.4 14/34] USB: serial: option: add Telit LE910C1-EUX compositions

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas commit 399ad9477c523f721f8e51d4f824bdf7267f120c upstream. Add Telit LE910C1-EUX compositions: 0x1031: tty, tty, tty, rmnet 0x1033: tty, tty, tty, ecm Signed-off-by: Daniele Palmas Link: https://lore.kernel.org/r/20200525211106.27338-1-dnl...@gmail.com Cc:

[PATCH 4.19 22/25] x86/speculation: Add SRBDS vulnerability and mitigation documentation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7222a1b5b87417f22265c92deea76a6aecd0fb0f upstream Add documentation for the SRBDS vulnerability and its mitigation. [ bp: Massage. jpoimboe: sysfs table strings. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Reviewed-by: Tony Luck Reviewed-by: Josh P

[PATCH 4.19 20/25] x86/cpu: Add table argument to cpu_matches()

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 93920f61c2ad7edb01e63323832585796af75fc9 upstream To make cpu_matches() reusable for other matching tables, have it take a pointer to a x86_cpu_id table as an argument. [ bp: Flip arguments order. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Signed-off-

[PATCH 4.19 21/25] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7e5b3c267d256822407a22fdce6afdf9cd13f9fb upstream SRBDS is an MDS-like speculative side channel that can leak bits from the random number generator (RNG) across cores and threads. New microcode serializes the processor access during the execution of RDRAND and RDSEED. Thi

[PATCH 4.19 06/25] vsock: fix timeout in vsock_accept()

2020-06-09 Thread Greg Kroah-Hartman
From: Stefano Garzarella [ Upstream commit 7e0afbdfd13d1e708fe96e31c46c4897101a6a43 ] The accept(2) is an "input" socket interface, so we should use SO_RCVTIMEO instead of SO_SNDTIMEO to set the timeout. So this patch replace sock_sndtimeo() with sock_rcvtimeo() to use the right timeout in the

[PATCH 4.19 08/25] USB: serial: qcserial: add DW5816e QDL support

2020-06-09 Thread Greg Kroah-Hartman
From: Matt Jolly commit 3429444abdd9dbd5faebd9bee552ec6162b17ad6 upstream. Add support for Dell Wireless 5816e Download Mode (AKA boot & hold mode / QDL download mode) to drivers/usb/serial/qcserial.c This is required to update device firmware. Signed-off-by: Matt Jolly Cc: sta...@vger.kernel

[PATCH 4.19 07/25] net: check untrusted gso_size at kernel entry

2020-06-09 Thread Greg Kroah-Hartman
From: Willem de Bruijn [ Upstream commit 6dd912f82680761d8fb6b1bb274a69d4c7010988 ] Syzkaller again found a path to a kernel crash through bad gso input: a packet with gso size exceeding len. These packets are dropped in tcp_gso_segment and udp[46]_ufo_fragment. But they may affect gso size cal

[PATCH 4.14 41/46] x86/cpu: Add table argument to cpu_matches()

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 93920f61c2ad7edb01e63323832585796af75fc9 upstream To make cpu_matches() reusable for other matching tables, have it take a pointer to a x86_cpu_id table as an argument. [ bp: Flip arguments order. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Signed-off-

[PATCH 4.14 39/46] nvmem: qfprom: remove incorrect write support

2020-06-09 Thread Greg Kroah-Hartman
From: Srinivas Kandagatla commit 8d9eb0d6d59a5d7028c80a30831143d3e75515a7 upstream. qfprom has different address spaces for read and write. Reads are always done from corrected address space, where as writes are done on raw address space. Writing to corrected address space is invalid and ignored

[PATCH 4.14 43/46] x86/speculation: Add SRBDS vulnerability and mitigation documentation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7222a1b5b87417f22265c92deea76a6aecd0fb0f upstream Add documentation for the SRBDS vulnerability and its mitigation. [ bp: Massage. jpoimboe: sysfs table strings. ] Signed-off-by: Mark Gross Signed-off-by: Borislav Petkov Reviewed-by: Tony Luck Reviewed-by: Josh P

[PATCH 4.14 44/46] x86/speculation: Add Ivy Bridge to affected list

2020-06-09 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 3798cc4d106e91382bfe016caa2edada27c2bb3f upstream Make the docs match the code. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst | 7

[PATCH 4.14 18/46] p54usb: add AirVasT USB stick device-id

2020-06-09 Thread Greg Kroah-Hartman
From: Giuseppe Marco Randazzo commit 63e49a9fdac1b4e97ac26cb3fe953f210d83bc53 upstream. This patch adds the AirVasT USB wireless devices 124a:4026 to the list of supported devices. It's using the ISL3886 usb firmware. Without this modification, the wiki adapter is not recognized. Cc: Signed-of

[PATCH 4.19 13/25] usb: musb: Fix runtime PM imbalance on error

2020-06-09 Thread Greg Kroah-Hartman
From: Dinghao Liu commit e4befc121df03dc8ed2ac1031c98f9538e244bae upstream. When copy_from_user() returns an error code, there is a runtime PM usage counter imbalance. Fix this by moving copy_from_user() to the beginning of this function. Fixes: 7b6c1b4c0e1e ("usb: musb: fix runtime PM in debu

[PATCH 4.14 24/46] l2tp: do not use inet_hash()/inet_unhash()

2020-06-09 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 02c71b144c811bcdd865e0a1226d0407d11357e8 ] syzbot recently found a way to crash the kernel [1] Issue here is that inet_hash() & inet_unhash() are currently only meant to be used by TCP & DCCP, since only these protocols provide the needed hashinfo pointer.

[PATCH 4.14 42/46] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit 7e5b3c267d256822407a22fdce6afdf9cd13f9fb upstream SRBDS is an MDS-like speculative side channel that can leak bits from the random number generator (RNG) across cores and threads. New microcode serializes the processor access during the execution of RDRAND and RDSEED. Thi

[PATCH 4.14 22/46] airo: Fix read overflows sending packets

2020-06-09 Thread Greg Kroah-Hartman
From: Dan Carpenter commit 11e7a91994c29da96d847f676be023da6a2c1359 upstream. The problem is that we always copy a minimum of ETH_ZLEN (60) bytes from skb->data even when skb->len is less than ETH_ZLEN so it leads to a read overflow. The fix is to pad skb->data to at least ETH_ZLEN bytes. Cc:

[PATCH 4.19 01/25] devinet: fix memleak in inetdev_init()

2020-06-09 Thread Greg Kroah-Hartman
From: Yang Yingliang [ Upstream commit 1b49cd71b52403822731dc9f283185d1da355f97 ] When devinet_sysctl_register() failed, the memory allocated in neigh_parms_alloc() should be freed. Fixes: 20e61da7ffcf ("ipv4: fail early when creating netdev named all or default") Signed-off-by: Yang Yingliang

[PATCH 4.14 40/46] x86/cpu: Add a steppings field to struct x86_cpu_id

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit e9d7144597b10ff13ff2264c059f7d4a7fbc89ac upstream Intel uses the same family/model for several CPUs. Sometimes the stepping must be checked to tell them apart. On x86 there can be at most 16 steppings. Add a steppings bitmask to x86_cpu_id and a X86_MATCH_VENDOR_FAMILY_M

[PATCH v2 9/9] Revert "PCI: brcmstb: Wait for Raspberry Pi's firmware when present"

2020-06-09 Thread Nicolas Saenz Julienne
This reverts commit 44331189f9082c7e659697bbac1747db3def73e7. Now that the VL805 init routine is run through a reset controller driver the device dependencies are being taken care of by the device core. No need to do it manually here. Signed-off-by: Nicolas Saenz Julienne --- drivers/pci/contro

[PATCH v2 1/9] dt-bindings: reset: Add a binding for the RPi Firmware reset controller

2020-06-09 Thread Nicolas Saenz Julienne
The firmware running on the RPi VideoCore can be used to reset and initialize HW controlled by the firmware. Signed-off-by: Nicolas Saenz Julienne --- Changes since v1: - Correct cells binding as per Florian's comment - Change compatible string to be more generic .../arm/bcm/raspberrypi,bcm

[PATCH 4.14 33/46] usb: musb: start session in resume for host port

2020-06-09 Thread Greg Kroah-Hartman
From: Bin Liu commit 7f88a5ac393f39319f69b8b20cc8d5759878d1a1 upstream. Commit 17539f2f4f0b ("usb: musb: fix enumeration after resume") replaced musb_start() in musb_resume() to not override softconnect bit, but it doesn't restart the session for host port which was done in musb_start(). The ses

[PATCH v2 7/9] usb: host: pci-quirks: Bypass xHCI quirks for Raspberry Pi 4

2020-06-09 Thread Nicolas Saenz Julienne
The board doesn't need the quirks to be run, and takes care of its own initialization trough a reset controller device. So let's bypass them. Signed-off-by: Nicolas Saenz Julienne Reviewed-by: Florian Fainelli --- Changes since v1: - Correct typos drivers/usb/host/pci-quirks.c | 12

[PATCH 4.14 19/46] kernel/relay.c: handle alloc_percpu returning NULL in relay_open

2020-06-09 Thread Greg Kroah-Hartman
From: Daniel Axtens commit 54e200ab40fc14c863bcc80a51e20b7906608fce upstream. alloc_percpu() may return NULL, which means chan->buf may be set to NULL. In that case, when we do *per_cpu_ptr(chan->buf, ...), we dereference an invalid pointer: BUG: Unable to handle kernel data access at 0x7dae0

Re: gcc-5: error: -gz is not supported in this configuration

2020-06-09 Thread Fangrui Song
compressed debug info date: 12 days ago config: x86_64-randconfig-r032-20200609 (attached as .config) compiler: gcc-5 (Ubuntu 5.5.0-12ubuntu1) 5.5.0 20171010 reproduce (this is a W=1 build): git checkout 10e68b02c861ccf2b3adb59d3f0c10dc6b5e3ace # save the attached .config to

[PATCH 4.14 30/46] USB: serial: qcserial: add DW5816e QDL support

2020-06-09 Thread Greg Kroah-Hartman
From: Matt Jolly commit 3429444abdd9dbd5faebd9bee552ec6162b17ad6 upstream. Add support for Dell Wireless 5816e Download Mode (AKA boot & hold mode / QDL download mode) to drivers/usb/serial/qcserial.c This is required to update device firmware. Signed-off-by: Matt Jolly Cc: sta...@vger.kernel

[PATCH v2 5/9] usb: xhci-pci: Add support for reset controllers

2020-06-09 Thread Nicolas Saenz Julienne
Some atypical users of xhci-pci might need to manually reset their xHCI controller before starting the HCD setup. Check if a reset controller device is available to the PCI bus and trigger a reset. Signed-off-by: Nicolas Saenz Julienne --- Changes since v1: - Use proper reset API - Make code

[PATCH 4.14 09/46] i2c: altera: Fix race between xfer_msg and isr thread

2020-06-09 Thread Greg Kroah-Hartman
From: Atsushi Nemoto [ Upstream commit 5d4c7977499a736f3f80826bdc9744344ad55589 ] Use a mutex to protect access to idev->msg_len, idev->buf, etc. which are modified by both altr_i2c_xfer_msg() and altr_i2c_isr(). This is the minimal fix for easy backporting. A cleanup to remove the spinlock wil

[PATCH 4.9 32/42] vt: keyboard: avoid signed integer overflow in k_ascii

2020-06-09 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit b86dab054059b970111b5516ae548efaae5b3aae upstream. When k_ascii is invoked several times in a row there is a potential for signed integer overflow: UBSAN: Undefined behaviour in drivers/tty/vt/keyboard.c:888:19 signed integer overflow: 10 * 11 cannot be rep

[PATCH 4.14 08/46] ARC: [plat-eznps]: Restrict to CONFIG_ISA_ARCOMPACT

2020-06-09 Thread Greg Kroah-Hartman
From: Vineet Gupta [ Upstream commit 799587d5731db9dcdafaac4002463aa7d9cd6cf7 ] Elide invalid configuration EZNPS + ARCv2, triggered by a make allyesconfig build. Granted the root cause is in source code (asm/barrier.h) where we check for ARCv2 before PLAT_EZNPS, but it is better to avoid such

[PATCH 4.9 35/42] nvmem: qfprom: remove incorrect write support

2020-06-09 Thread Greg Kroah-Hartman
From: Srinivas Kandagatla commit 8d9eb0d6d59a5d7028c80a30831143d3e75515a7 upstream. qfprom has different address spaces for read and write. Reads are always done from corrected address space, where as writes are done on raw address space. Writing to corrected address space is invalid and ignored

[PATCH 4.9 28/42] USB: serial: qcserial: add DW5816e QDL support

2020-06-09 Thread Greg Kroah-Hartman
From: Matt Jolly commit 3429444abdd9dbd5faebd9bee552ec6162b17ad6 upstream. Add support for Dell Wireless 5816e Download Mode (AKA boot & hold mode / QDL download mode) to drivers/usb/serial/qcserial.c This is required to update device firmware. Signed-off-by: Matt Jolly Cc: sta...@vger.kernel

[PATCH 4.9 36/42] x86/cpu: Add a steppings field to struct x86_cpu_id

2020-06-09 Thread Greg Kroah-Hartman
From: Mark Gross commit e9d7144597b10ff13ff2264c059f7d4a7fbc89ac upstream Intel uses the same family/model for several CPUs. Sometimes the stepping must be checked to tell them apart. On x86 there can be at most 16 steppings. Add a steppings bitmask to x86_cpu_id and a X86_MATCH_VENDOR_FAMILY_M

[PATCH 4.14 02/46] libnvdimm: Fix endian conversion issues 

2020-06-09 Thread Greg Kroah-Hartman
From: Aneesh Kumar K.V commit 86aa66687442ef45909ff9814b82b4d2bb892294 upstream. nd_label->dpa issue was observed when trying to enable the namespace created with little-endian kernel on a big-endian kernel. That made me run `sparse` on the rest of the code and other changes are the result of th

[PATCH 4.14 17/46] HID: i2c-hid: add Schneider SCL142ALM to descriptor override

2020-06-09 Thread Greg Kroah-Hartman
From: Julian Sax commit 6507ef10660efdfee93f0f3b9fac24b5e4d83e56 upstream. This device uses the SIPODEV SP1064 touchpad, which does not supply descriptors, so it has to be added to the override list. Cc: sta...@vger.kernel.org Signed-off-by: Julian Sax Signed-off-by: Jiri Kosina Signed-off-by

[PATCH 4.14 03/46] scsi: hisi_sas: Check sas_port before using it

2020-06-09 Thread Greg Kroah-Hartman
From: Xiang Chen [ Upstream commit 8c39673d5474b95374df2104dc1f65205c5278b8 ] Need to check the structure sas_port before using it. Link: https://lore.kernel.org/r/1573551059-107873-2-git-send-email-john.ga...@huawei.com Signed-off-by: Xiang Chen Signed-off-by: John Garry Signed-off-by: Mart

[PATCH 4.14 06/46] pppoe: only process PADT targeted at local interfaces

2020-06-09 Thread Greg Kroah-Hartman
From: Guillaume Nault We don't want to disconnect a session because of a stray PADT arriving while the interface is in promiscuous mode. Furthermore, multicast and broadcast packets make no sense here, so only PACKET_HOST is accepted. Reported-by: David Balažic Fixes: 1da177e4c3f4 ("Linux-2.6.1

[PATCH 4.14 12/46] net/ethernet/freescale: rework quiesce/activate for ucc_geth

2020-06-09 Thread Greg Kroah-Hartman
From: Valentin Longchamp [ Upstream commit 79dde73cf9bcf1dd317a2667f78b758e9fe139ed ] ugeth_quiesce/activate are used to halt the controller when there is a link change that requires to reconfigure the mac. The previous implementation called netif_device_detach(). This however causes the initia

[PATCH 4.14 13/46] net: ethernet: stmmac: Enable interface clocks on probe for IPQ806x

2020-06-09 Thread Greg Kroah-Hartman
From: Jonathan McDowell [ Upstream commit a96ac8a0045e3cbe3e5af6d1b3c78c6c2065dec5 ] The ipq806x_gmac_probe() function enables the PTP clock but not the appropriate interface clocks. This means that if the bootloader hasn't done so attempting to bring up the interface will fail with an error lik

[PATCH 4.9 09/42] net/ethernet/freescale: rework quiesce/activate for ucc_geth

2020-06-09 Thread Greg Kroah-Hartman
From: Valentin Longchamp [ Upstream commit 79dde73cf9bcf1dd317a2667f78b758e9fe139ed ] ugeth_quiesce/activate are used to halt the controller when there is a link change that requires to reconfigure the mac. The previous implementation called netif_device_detach(). This however causes the initia

[PATCH v9 02/11] drm: bridge: dw_mipi_dsi: abstract register access using reg_fields

2020-06-09 Thread Adrian Ratiu
Register existence, address/offsets, field layouts, reserved bits and so on differ between MIPI-DSI versions and between SoC vendor boards. Despite these differences the hw IP and protocols are mostly the same so the generic bridge can be made to compensate these differences. The current Rockchip

[PATCH 4.9 00/42] 4.9.227-rc1 review

2020-06-09 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.9.227 release. There are 42 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu, 11 Jun 2020 17:39:58 +. Anything rec

[PATCH 4.9 30/42] USB: serial: option: add Telit LE910C1-EUX compositions

2020-06-09 Thread Greg Kroah-Hartman
From: Daniele Palmas commit 399ad9477c523f721f8e51d4f824bdf7267f120c upstream. Add Telit LE910C1-EUX compositions: 0x1031: tty, tty, tty, rmnet 0x1033: tty, tty, tty, ecm Signed-off-by: Daniele Palmas Link: https://lore.kernel.org/r/20200525211106.27338-1-dnl...@gmail.com Cc:

[PATCH 4.9 25/42] NFC: st21nfca: add missed kfree_skb() in an error path

2020-06-09 Thread Greg Kroah-Hartman
From: Chuhong Yuan [ Upstream commit 3decabdc714ca56c944f4669b4cdec5c2c1cea23 ] st21nfca_tm_send_atr_res() misses to call kfree_skb() in an error path. Add the missed function call to fix it. Fixes: 1892bf844ea0 ("NFC: st21nfca: Adding P2P support to st21nfca in Initiator & Target mode") Signe

[PATCH v9 05/11] dt-bindings: display: add i.MX6 MIPI DSI host controller doc

2020-06-09 Thread Adrian Ratiu
This provides an example DT binding for the MIPI DSI host controller present on the i.MX6 SoC based on Synopsis DesignWare v1.01 IP. Cc: Rob Herring Cc: Neil Armstrong Cc: Fabio Estevam Cc: Laurent Pinchart Cc: devicet...@vger.kernel.org Tested-by: Adrian Pop Tested-by: Arnaud Ferraris Signe

<    3   4   5   6   7   8   9   10   11   12   >